课程名称:计算机英语教程  

  • 作  者:吕云翔 杨雪 林珣 编著
  • 出版时间:2012-3-1 0:00:00
  • 字  数:455千字
  • 责任编辑:武恩玉
  • 页  数:270页
  • 开  本:16
  • ISBN书号:978-7-115-27093-1
  • 所属分类:本科 >> 计算机类 >> 计算机基础平台课
  • 所属丛书:21世纪高等学校计算机规划教材——精品系列
  • 定  价:¥32.00
  • ---------------------------------------------------------------------------------



第一单元:The Fundaments of Computers //计算机基础

(1)   单词拼写

IBMà  Business Machines (美国)国际商用机器公司

RAMàRandom Access Memory   随机访问存储器

ROMàRead Only Memory 只读存储器

 

(2)   判断题

1.Before 1936,all devices which had the computing power had to rely on other electronics. (F)
 computing power //计算能力 
 electronics  //n. 电子学;电子学应用,电子器件;电子工业;电子流行音乐 
 

2.  IBM was the first company who initiated the computer business. (T)
initiate //vt. 开始,发起;传授;创始,开辟;接纳新成员 
             // n . 新加入某组织(或机构、宗教)的人,新入会的人;被传授初步知识的人 
            //adj. 被传授初步知识的;新入会的 
 

3.ENIAC I was made with the technology of vacuum tube.  (T)
ENIAC // n. 电子数字积分计算机,ENIAC 计算机
vacuum tube// n. <美>真空管,电子管
 

4.Prior to the high level programming language,”assembly” or binary is difficult to write and understand for the majority.  (F)
 Prior to //adj. 先前的;较早的;在前的;优先的
 majority //n. 多数;(获胜的)票数;成年;法定年龄
 

5. Apple produced the first computer with a GUI.   (T)

 

(3)   选择题

1. Which of the following descriptions is WRONG according to this article? (D)

A.    It was the creation of the integrated circuit that made the volume of the computers smaller.

B.    ARPA net provided the foundation for the Internet that we use today.

C.     Intel produced the first chip in the world,which exploded the innovation of computer science.

D.    “Mouse” obtained its name from the feature of its figure.
creation //   创造
 integrated circuit //集成电路
volume // n. 量,大量;体积;音量;卷 adj. 大量的 vi. 成团卷起 vt. 把…收集成卷
 exploded//adj. 爆破了的,被打破的 
                  //v. (使)爆炸( explode的过去式和过去分词 );
                 //突然(发出巨响,活跃起来,迸发感情);推翻
 innovation//n. 改革,创新;新观念;新发明;新设施
 

2.   Among the following products,which appeared the earliest during the computer software development 
history? (B)

A.MS-DOS   B.WordStar   C.Spacewar   D.VisiCalc spreadsheet
among // 在...中,在...内

3.In the following devices,which is NOT included in the list of the core components of modern computers(B)

A.Chip  
B.Transistor  (晶体管)
C.RAM  
D.Microprocessor
        component//n. 成分;零件;[数]要素;组分 adj. 组成的;合成的;构成的;成分的
               

 

第二单元 Computer Hardware

(1) 单词拼写

BIOSàBasic Input Output System  基本输入输出系统

USBà  通用串行总线

 

(2)判断题

1.The motherboard is sometimes alternatively known as the mainboard,system board,the logic board 
and backplane. (T)
  alternatively// adv. 做为选择,二者择一地;作为一种选择
        backplane// 底板
 

2.A motherboard provides physical sockets and slots as some peripheral interfaces.(F)
peripheral//  adj. 外围的;次要的;(神经)末梢区域的 n. 外部设备
 

3.BIOS is stored in non-volatile memory chips.(T)
 non-volatile memory//  非易失性存储器,不变性记忆器
 

4.In modern computer it is increasingly common to integrate some peripherals into the 
motherboard inself. (T)
        increasingly// adv. 越来越多地;日益,格外;越来越…;愈
        common//adj. 普通的;通俗的;[数学]公共的;共有的 
                       //n. [法律](对土地、水域的)共有权;公共用地;普通;平民 
 

5.By combining many functions on one PCB,highly-integrated motherboards are more complex and 
more expensive. (F)
 combining//  n. 结合性的,化合的 
                            //v. (使)联合( combine的现在分词 );兼有;兼备;使融合(或并存)

 

(2)   选择题

1.     Which of the following is NOT attached to the motherboard via edge connectors and cables in a 
typical desktop computer?

A.External storage   
 B.Controllers for video display 
C.Microprocessors

D.Peripheral devices(外部设备)
        attached to//附属于,隶属于
via//prep. 经过;通过,凭借;取道
        edge connectors//边缘连接器
         cables// n. 电报( cable的名词复数 );电缆;(系船用的)缆绳;(船只、桥梁等上的)巨缆 
 

2.Which of the following components can be used to attach peripheral devices to the motherboard as 
plug-in cards or via cables?

A.Power connectors   
B.Expansion Card Slots  (扩展插槽)
C.CPU Sockets

D.Non-volatile memory chips
        component//n. (机器、设备等的)构成要素,零件,成分;
                             //成分( component的名词复数 );          
                            //  [物理化学]组分;[数学]分量;(混合物的)组成部分 
                            //adj. 组成的,构成的 
 

3.In the following descriptions,which is RIGHT about the functions of CPU socket?  (D)

A.A CPU socket houses a CPU on motherboard.//在主板上,一个CPU插槽只装一个CPU

B.A CPU socket provides heat sink.//heat sink:吸热设备;冷源;散热片;(半导体)热沉

C.A CPU socket forms an interface both with the CPU and the PCB.//PCB:印刷电路板

D.All above.

 

第三单元 Computer Software



  (1) 判断题



1.     Corel Painter offers both conventional and unconventional materials and tools for artists.(F)
        Corel Painter//电脑美术绘画软件 
        conventional//adj. 传统的;习用的,平常的;依照惯例的;约定的 
        materials// n. 材料( material的名词复数 );布料;衣料;[哲学] 物质 
 

2.     Graphics tablet enables users to reproduce the effect of physical painting.(T)
                    graphics tablet//图形输入板
                    enables//v. 使能够,提供做…的权利[措施]( enable的第三人称单数 );使可能                     reproduce//    vt.& vi. 复制,重现,再版;生殖,繁殖 vt. 使再次发生;再现                
                     effect//n. 影响;效果;印象;所有物 vt. 使发生;引起;产生(效果)
 

3.     A painter emulates the visual characteristics of traditional media.(T)
            emulates//v. 与…竞争( emulate的第三人称单数 );努力赶上;计算机程序等仿真;模仿 
            characteristics//n. 特性,特征,特色,[数](对数的)首数( characteristic的名词复数 );
                                        //独特性;性质 
 

4.     Corel Painter Sketch Pad is the newest product with more drawing tools.(T)
            Corel Painter Sketch Pad//平板手绘图像软件
            product//n.产品
            drawing//n. 绘画;制图;图画;图样 v. 绘画(draw的现在分词);拖;拉;拔
 

5.     Painter was acquired by Corel Corporation and was replaced by “Procreate”.(T)
  acquired//adj. (尤指靠自己的努力或行动)获得的;习得的;<医>后天的;
                            //起初不喜欢但后来逐渐培养的爱好 
                            //v. 获得( acquire的过去式和过去分词 );(使用探测器)捕获(目标);
                            //取得;(计算机、机器人等)捕捉
            procreate//vt.& vi. 生(儿、女),生育,生殖
           Corel Corporation//Corel公司
 

(2) 选择题

1.     Which of the following items is NOT the traditional tools for artists in Painter?  (C)

       A.    Charcoal//n. 木炭;炭画笔;木炭画 vt. 用木炭画;炭烤
 B.Felt pens//是类似海棉状吸管的吸水笔 n.毡尖笔
 C.Pattern pens //图案笔,图案画笔
 D.Color pencil //测温色笔
 

2.     Which of the following events did happen latest in the development of Painter?  (A)

A.    Corel Painter Sketch Pad was launched.//平板手绘图像软件被推出

B.    “Floaters” were released with Paiter.//Floaters:债券发行人

C.     Painter 1 2 was released.

D.    Painter was acquired by Corel Corporaton. //Painter被Corel公司收购
    latest//n. 最近的,最新的 
                    //adj. 最近的,最新的;已故的( late的最高级);迟的;晚期的;新的 
 

3.     Which of the following items is not included in the “three companion  application ” 
in Painter Series? (D) 

       A.    Expression  
 B.Dabbler  
 C.Sketcher  
 D.Sketch Pad

第四单元 Operating System

单词拼写:

XMLàeXtensible Markup Language  可扩展标记语言
 

第五单元 Computer Programming

单词拼写:

OOPàObject-Oriented Programming 面向对象程序设计

UMLàUnified  Modeling Language统一建模语言
 

第六单元 Databases

1.)单词拼写:

SQLàStructured Query Language  结构化查询语言

OODBMSàObject-Oriented DataBase Management System 面向对象的数据库管理系统
 

2.     )判断题

1.     In a relational database,all data are stored and accessed via relations. (T)
 via//prep. 经过;通过,凭借;取道
 

2.     The relational database terms “tuple” is equivalent to “column” in SQL.  (T)
            tuple//n.元组,数组
           column//n. 纵队,列;圆柱
 

3.     A table is organized  into rows and columns in a relational database.   (T)
 

4.     The term “relational database” often refers to “relational database management system” for short. (F)
  refer to//引用
        for short//简写,缩写

5.     An index is one way of providing quicker access to data.(T)
index//索引
 

3) 选择题

1.Which of the following items should be used for collecting and customizing common operations?

A.Indices //index的复数
B.Primary Key//主键
 C.Stored Procedures //存储过程
D.Foreign Key //外键
 

2.Which of the following RDBMS is not open source according to this article?

A.MySQL  
 B.PostgreSQL  
 C.SQL Server 
D.SQLite
 

3.Which of the following items need not have unique values in the referencing  relation?  (D)

A.Surrogate key//代理键
 B.Primary key //主键
 C.Composite key//组合键,复合键
 D.Foreign key//外键
            referencing  relation//引用的关系 

第七单元  Computr Network

单词拼写:

MACàMedia Access Control 介质访问控制

CSMA/CDàCarrier Sense Multiple Access/Collision Detection 载波侦听多路访问/冲突检测

WPAàWi-Fi Protected Access   Wi-Fi保护访问

APà>Access Point 接入点

PANàPersonal-Area Network  个人区域网
 

判断题:

1.     The name “Ethernet” was derived from the similar fundamentals between computers communicating 
over a shared coaxial cable and radio broadcast systems over the ether.(T)
        Ethernet//n.以太网
        derive//vt.& vi. 得到,导出;源于,来自;(从…中)提取
        derived from//采自,来自
        fundamentals//n. 原理;基本原则,基本法则( fundamental的名词复数) 
        coaxial cable//同轴电缆
        broadcast systems//广播系统
         

2.     Ethernet,token ring,FDDI and ARCNET LAN are all LAN standards. (F)
 

3.     Data packets are blocks of data that are individually sent and delivered,via which Ethernet stations 
communicate with each other.(T)
        individually//adv. 分别地;各个地;各自地;独特地
        delivered// adj. 在…交货的,包括运费在内的 
                            //v. 递送,交付( deliver的过去式和过去分词 );发表;交出;发动 
 

4.     A specific protocol can be identified via the packet type it uses in current Ethernet.(F)
//应该是通过编号来标识包

5.     Now,most manufacturers build smaller network card with decreasing cost and the reduced 
panel space in PC. (T)
  manufacturers//n. 制造商,制造厂( manufacturer的名词复数 )
 

6.     A Wi-Fi enable device can connect to the Internet when within range of any wireless 
according to the text.(T)
 

7.     A Single Wi-Fi access point has a greater range indoors than outdoors.(F)
 

8.     Wi-Fi connections can be disrupted by having other devices in the same area with an interference.(T)
 disrupted//v. 使混乱,扰乱( disrupt的过去式和过去分词 )
         interference//n. 干涉,干扰,冲突;介入;妨碍,打扰,阻碍物;冲突,抵触 
 

9.     Wi-Fi in the higher GHz frequency block has better range than in the lower GHz frequency block.(F)
 



 10.  There are about 800 million new Wi-Fi devices around thd world now.(T)
 



选择题

1.     Which of the following has been outdated among wired LAN technology?

      A.   The shielded twisted pair //非屏蔽双绞线
B.The fiber optic//光纤

//同轴电缆 
 D.The unshielded twisted pair//屏蔽双绞线
 outdated//adj. 过时的,旧式的,落伍的,不流行的 
                        // 使过时(outdate的过去式和过去分词
       among//prep. (表示牵涉)经过;(表示位置)处在…中;
                    //示范围)在…之内;(表示所属)为…所特有 

2.     Which of the following is WRONG about the comparison between the early version and the 
current version of Ethernet?

A.    The original address fields in the experimental Ethernet have been changed in the current versions.

B.    The destination and source addresses have been overleapt in the current Ethernet versions.

C.  A switched full duplex system can offer higher performance  than the CSMA/CD scheme used 
by the early Ethernet.



      D.    The running speed of the current Ethernet is 100 times and beyond as fast as that of the 
            early versions.
experimental//adj. 实验的;根据实验的;试验性的 n. 试验性的东西


overleapt//v. 越过( overleap的过去式和过去分词 )

100 times//100倍

switched//v. 转变,改变( switch的过去式和过去分词 );转换;挥动(棍棒、鞭子等);迅速转动 

duplex system//双重系统


 3.     What does the phrase “frame-based” mean appearing at the beginning of the article? 


A.    All generation of  Ethernet conform to the multi-layers structure of the OSI reference model.

B.    All generations of Ethernet are built on improving infrastructure from coaxial cable to twisted pair.

C.     All generations of Ethernet base on the same architecture formats and the same interfaces for 
higher layers.

D.    All generations of Ethernet base on the same physical layer as the underlying frame.
conform to//v. 符合,遵照;顺应;相合;入
infrastructure//n. 基础设施;基础建设
 frame-based//基于帧
underlying frame//基本架构
 

4.     Which of the following description is WRONG about Wi-Fi? 

A.    Any standard Wi-Fi device will work anywhere in the world with global operative set of standards.

B.    Now most laptops are built with wireless network adapters inside.

C.     One can connect Wi-Fi devices in ad-hoc mode for client-to-client connections without a router.

D.    Communications between two devices need the involvement of an access point with WI-Fi.
ad-hoc mode//点对点模式
involvement// n. 牵连,参与;加入;财政困难;牵连的事务,复杂的情况 
 

5.     Which of the following type of wireless devices has the highest power consumption?

      A.    Bluetooth 
B.ZigBee 
C.Wi-Fi  
 D.Not mentiond
 consumption//n. 消费;肺病;耗尽;[医学]消耗性疾病 
 

6.     Which of the following descriptions in WRONG about the uses of Wi-Fi? 

A.A carrier wave is used to transmit the data in packets.

B.The hardware provides indication to the sender about whether the transmission was delivered.

C.Each station is constantly tuned in on the channel.

D.All stations share a single radio frequency communication channel.
        carrier wave//载波
        transmit//vt. 传输;传送,传递;发射;传染 vi. 发送信号
        indication//n. 指示;象征;表明;标示
        delivered//adj. 在…交货的,包括运费在内的 
                         //v. 递送,交付( deliver的过去式和过去分词 );发表;交出;发动 
         constantly//adv. 不断地,时常地;时刻;常川;历来

 



第八单元 The Internet



判断题
1.Web2.0 is regarded as Web-as-participation-platform while Web 1.0 is regarded as 
Web-as-information-source.  (T)
         participation//n. 参加,参与;分享
 

2.Ajax and Flash are widely used in RIA.  (T)
 

3.Web2.0 encourages users' contribution to Website content as well as supports their privacy.  (T)
         as well as//adv. 也,又 既…又…;除…之外(也);此外
         privacy//n. 隐私,秘密;隐居;私事;不受公众干扰的状态
 

4.Web2.0 adopts entirely new protocols and adds an additional layer of abstraction on top of them.   (F)
        adopts//v. 采用( adopt的第三人称单数 );收养;正式接受;吸收(外来词语) 
         additional//adj. 额外的,附加的;另外的,追加的;补充;外加 
 

5.Social Web has shifted the way of people communication fundamentally.   (T)

        shifted//v. 改变( shift的过去式和过去分词 );去掉;摆脱掉;换挡 
        fundamentally//adv. 基础地;根本地;从根本上

选择题
1.Which of the following is WRONG about Web 2.0?    (D)
A.The ideas of Web 2.0 was featured originally in late 2004.
B.Web 2.0 changes the ways of software developers and end-users utilizing the web.
C.Web 2.0 enhances creativity,information sharing and collaboration among Web users.
D.Web 2.0 enables business to embrace the Web as a platform and user its strengths more effectively.
         featured//adj. 有…的面貌特征的,作为号召物的;作为特色的 
         originally//adv. 起初,原来;独创地,独出心裁地;自来;本 
         utilizing//v. 利用,使用( utilize的现在分词 )
         enhances//v. 提高( enhance的第三人称单数 );增进;用计算机增强(照片等);
                        //提高…的价值(或价格);使变青白,使变苍白( etiolate的过去式和过去分词 );
                        //增进;用计算机增强(照片等);提高…的价值(或价格)
        collaboration// n. 合作,协作;通敌,勾结

        embrace//vt.& vi. 拥抱 vt. 包括;包含;接受;信奉 n. 拥抱,怀抱 
                        //vt. 信奉;接受;等于 
        strengths//n. 力( strength的名词复数 );优点;(光、声、色等的)力度;人力[数] 

2.What does Tim Berners-Lee's description about Web 2.0 mean?   (D)
A.Web 2.0 is a very popular now.
B.Web 2.0 is not defined clearly.
C.Web 2.0 is an entirely new concept.//concept概念,观念
D.web 2.0 is an revolution in the World Wide Web.
             revolution//n.革命
 

3.Which of the following facts is(are) mentioned about the usage on Web 2.0 in this article?    (D)
A.Blogs 
B.Wikis 
C.RSS 
D.All above

        usage//n. 使用;用法;习惯;惯例




第十单元   Computer Security

判断题


1.Windows is by far the most popular operating system for virus writers due to their market dominance.

  by far//…得多; 更; 尤其;到目前为止

             dominance//n. 优势;支配;统治;优性

 


2.Bugs in software generally means potential exploits for the spread of viruses. 

(T)

            generally//adv. 一般地,通常;广泛地,普遍地;概括地;主要地 

            potential//adj. 潜在的,有可能的;[语法学]可能语气的,表示可能性的;有能力的 

                               //n. 潜力,潜能;[物]电位,势能;潜能的事物;[语]可能语气 

            exploits//v. 开采( exploit的第三人称单数 );利用(…为自己谋利);运用;剥削 

            spread//vt.& vi. 伸开;展开;(使)传播;(使)散布 

                        //n. 范围;连续的一段时间 

                        //vt. 涂;把…覆盖在…上(over);把…敲平;散发(气、烟等) 

                        //vi. (景色、景致)展现;传开;(人群)散开;软化 

                        //adj. 张开的;[语言学]双唇展开的;(宝石)扁薄发光的;

                        //(文章、照片等)跨两栏(或多栏)的 

3.The method of using a heuristic algorithm to find viruses can detect viruses which 

    haven't yet been defined in the current database of known virus signatures. 

(T)

                  heuristic algorithm//启发式算法



4.The backups on CD/DVD are always safe because the media becomes read-only and can no longer be affected by a virus.  (F)


5.Anti-virus software can enhance the underlying capability of host software to 

   prevent virues transmitting. 

(T)

       

     enhance//vt. 提高,增加;加强

            underlying//adj. 潜在的,含蓄的;基础的;表面下的,下层的;[法]优先的 

                                //v. 优先于(underlie的ing形式);构成…的基础(或起因),引起 

            capability//n. 才能,能力;容量;性能;生产率

            transmitting//v. 发射,播送,广播( transmit的现在分词 );传播;传导;传(热、声等) 


选择题

1.Which of the following is RIGHT about the infection strategies of viruses?  (C)

A.Virues may take advantage of present network services to facilitate their spread.

B.All original virues must modify the copies in metamorphic virues  for spread.

C.The success of viruses all relies on their fast infection rate to spread.

D.All virues pretend that they are executable files in order to replicate themselves.

       infection//n. <医>传染,感染;传染病,染毒物;影响

        strategies//n. 策略( strategy的名词复数 );战略;战略学;对策 

        facilitate//vt. 促进,助长;使容易;帮助

        metamorphic//adj. 变形的,变质的,改变结构的

        pretend//vt. 假装,伪装;假称;装扮 vi. 扮演;自称;假装,矫作 adj. 仿制的

        replicate//vt. 复制,复写;重复,反复;折转;[生] 复制 

                          //adj. 复制的;折叠的;[植]折转的 n. 复制品;八音阶间隔的反覆

2.Which of the following is NOT an effective countermeasure to viruses.   (D)

A.Updating operating system regularly to patch security holes.

B.Installing and regularly updating anti-virus software.

C.Marking regular backups of data on different file system.

D.Using different operating system on the same file system.

        countermeasure//n. 对策,反措施

        regularly//adv. 有规律地,按时,照例,按部就班地;整齐地,有条不紊地;

                        //经常,不断地;定期地

        patch //n. 补丁,补片;碎片,碎屑;(文章的)一段;斑点 

                    //vt. 修补,拼凑;暂时遮掩一下;修理,平息(吵架等);用美人斑装饰(脸) 

                  //vi. 打补丁


3.Why does the author give the example of Bliss?

  (C)

A.To argue that the Bliss virus has characteristic of viruses as opposed to worms.

B.To argue that the Bliss virus could be harmless even if user ran it on Unix.

C.To argue that other operating systems may run viruse,not just Windows.

D.To argue that the Bliss virus only remains chiefly a research curiosity.

         argue//vt. 坚决主张;提出理由证明;说服,劝告;表明,证明 vi. 争论,辩论;提出理由

        opposed//vt. 和…起冲突;和敌军起冲突;反抗,抗拒;

                        //相对:放在某事物对面以对比或平衡 vi. 对抗,对立 

                         //adj. 强烈反对某事物的;(表示对比)而,相对于;相反的;敌对的 

         harmless//adj. 无害的,不致伤的;没有受到损失或免于法律责任的 

        chiefly//adv. 首先,第一;主要;尤其 adj. 领袖(般) 

      curiosity//n. 好奇心,爱打听的癖性;奇人;奇物,古玩;奇特性 

  




第11单元 Software Engineering

单词拼写
VM-->Virtual Machine //虚拟机
XP-->Extreme Programming  //极限编程
判断题
1.The potential complexity of software systems necessitates software engineering.  (T)
        complexity//n. 复杂性,错综复杂的状态;复杂的事物;复合物 
        necessitates//v. 使…成为必要,需要( necessitate的第三人称单数 ) 
       software engineering//软件工程

2.Custom software roses first from small business.    (F)

3.The development of hardware allows software to grow more complex and more 
widely available. (F)
        grow//vt. 种植;扩大;扩展;增加 vi. 生长;渐渐变得;逐渐开始 
                //vt.& vi. (使)留长,蓄长

4.Systematic and formal code reuse is necessitated to industrialize the software 
development process.  (T)
        systematic//adj. 有系统的,有规则的;有条不紊的;有步骤的;一贯的,惯常的 
        formal//adj. (学校教育或培训)正规的;方式上的;礼仪上的 
                    //n. <美>须穿礼服的社交集会;<口>夜礼服
        reuse//vt. 再用,重新使用 n. 再用,重新使用
        industrialize//vt.& vi. (使)工业化
        necessitated//v. 使…成为必要,需要( necessitate的过去式和过去分词 ) 

5.Software engineeing is subject to many other disciplines,such as computer science,
project management and system engineeing.    (F)
        subject//n. 主题,话题;学科,科目;[哲]主观 
                    //adj. 须服从…的;(在君主等)统治下的 v. 提供,提出;使…隶属
        disciplines//n. 学科( discipline的名词复数 );符合行为准则的行为(或举止) 
                             //v. 训练( discipline的第三人称单数 );(通过训练和监督)使有纪律;
                            //处罚;使有条理 
 选择题
1.Which of the following emerged first in the history of software engineering?  (D)
A.Code repositories 
B.Commercial OOP language
C.Extreme programming 
D.Optimizing inspections
        emerged//v. 出现( emerge的过去式和过去分词 );露头;形成;事实
        repositoriesn// 存放处( repository的名词复数 );仓库;宝库;学识渊博的人
        commercial//adj. 商业的;贸易的;营利的;靠广告收入的 n. (电台或电视播放的)广告 
        optimizing//v. 使最优化,使尽可能有效( optimize的现在分词 );最佳化;寻优 
        inspections//n. 检查( inspection的名词复数 );检验;视察;检阅

2.Which of the following is WRONG about the terminology used in software 
engingeering?   (D)
A.Offshore outsourcing--Platform //离岸外包平台
B.Lean software development-Process
C.Macro assemblers-Tool //宏汇编器
D.Smalltalk-Language
        terminology//n. 专门名词;术语,术语学;用辞
        offshore//adj. 离开海岸的;近海的;海外的,国外的 adv. (指风)向海的,离岸的
        outsourcing//n. 外购;外部采办

3.Which of the following is RIGHT about the current trends in software engineering?   (B)
A.Aspects describle the behavior or all objects or functions in particular circumstances and 
    design particular-purpose code for them.
B.Agile software development is a light and change-driven process.
C.Software Product Lines produce successions of individual software system products.
D.Experimental software engineering advances the knowledge on experiments througth software.
        aspects//n. 方面( aspect的名词复数 );面貌;方位;样子
        circumstances//n. 境况;境遇;(尤指)经济状况;命运;
                                    //环境( circumstance的名词复数 );事件;境遇;机遇 
        agile//adj. 灵巧的;轻快的;灵活的;机敏的
        driven//adj. (人)奋发努力的;发愤图强的;像雪一样纯洁;道德高尚 
                    //v. 驾车快于,驾车技术胜过( outdrive的过去分词 ) 
        individual//adj. 个人的;独特的;个别的 n. 个人;个体
        successions//n. 连续( succession的名词复数 );连续不断的人[事物];继承,继任;继承权 
        expermental//adj. 实验的;根据实验的;试验性的 n. 试验性的东西
        advances//n. 接近,友好的表示,求爱;增长( advance的名词复数 );
                           //借款;(价格、价值的)上涨 v. (使)前进( advance的第三人称单数 );
                           //(使)发展;促进;提高 
 

翻译



第五单元:

Object-oriented programming can trace its roots to the 1960s.

面向对象的编程,其根源可以追溯到20世纪60年代。
 

As hardware and software became increasingly complex,quality was often 
compromised .

硬件和软件变得越来越复杂,质量往往大打折扣。
 

Researchers studied ways in which software quality could be maintained.

研究人员研究了软件质量可以维持的方法。
 maintain//vt. 保持,维持;保养,维护;抚养,赡养
 

Computer programming methodology(方法) focuses on data rather than processes ,
with programs composed(组成) of self-sufficient(自足的,自给自足) modules(object) containing all the information needed to manipulate (操纵,处理)a data structure.





//计算机程序设计方法强调的是数据而不是过程,它使用由自给自足的模块(对象)组成的程序,这些模块包含了处理数据结构所需的所有信息 。
 

Object-oriented programming  may be seen as a collection (集合)of cooperating 
objects, as opposed to a traditional view in which a program may be seen as a group of tasks to 
compute("subroutines").
// 面向对象的程序也许可以被看成许多相互合作的对象组成的集合,而传统的看法则把程序看成由许多函数组成的集合,或是简单的计算机指令集合。


In oop ,each object is capable(能干的,能胜任的) of receiving messages,processing 
data and sending messages to other object.





在面向对象编程中,每个对象都能够接收消息,处理数据和发送消息到其他对象。
 

1、Object-oriented programming was deployed(部署) in part as an attempt to address(处理) this problem by strongly emphasizing(强调) discrete(分离的,非连续的) units of programming logic and re-usability in 
software
 面向对象程序设计的使用,在某种程度上通过强有力地加强程序设计逻辑的离散单元和软件中的可重用性来尝试处理这个问题。
in part// 在某种程度上,部分地;一半

 

2、In the past decade java has emerged in wide use partially(部分地) because of its 
similarity to c and to c++,but perhaps more importantly because of its implementation 
using a virtual machine that is intended to run code unchange on many different 
platforms.

在过去十年中,Java已经被广泛使用,部分原因是在于其与C和C++的相似之处,然而或许更重要的是由于Java采用虚拟机实现,虚拟机是为在许多不同平台上运行无需修改的代码而设计的。     
     emerged//v. 出现( emerge的过去式和过去分词 );露头;形成;事实 
     implementation//成就 
     intended//adj. 有意的;预期的 n. 已订婚者 
             //v. 打算(intend的过去式和过去分词);意指
 

第六单元:

1、A relational database matches data by using common characteristics found within 
the data set .The resulting groups of data are organized and are much easier for many 
people to understand.

关系型数据库通过使用数据集内发现的共同特点来匹配数据。由此产生的数据组被组织起来并且更容易为很多人理解。
 

2、Applications access data by specifying queries,which use operations such as select 
to identify tuples,project to identify attributes and join to combine relations .relations can be modified using the insert ,delete and update operations.

应用程序通过指定查询来访问数据,这会用到各种操作,例如:使用select(选择)来确定元组,
使用project(投影)来确定属性,使用join(组合)来组合关系。关系也可通过使用insert(插入)、 
 delete(删除)和update(更新)操作被修改。
 

第十单元(短文翻译):

1、In order to replicate itself , a virus must be permitted to execute code and write to memory . 
 //为了复制自己,病毒必须被允许执行代码和写入内存。


For this reason , many viruses attach themselves to executable files that may be part of legitimate programs. //

由于这个原因,许多病毒附着于类似于合法的程序的可执行文件。
 



If a user attempts to launch an infected program,the virus  code may be executed 

simultaneously.//


如果用户试图启动一个受感染的程序,该病毒也会同时运行。



 


Viruses can be divided into two types based on their behavior  when they are executed.
//根据

运行时的行为的不同,病毒可分为两种类型。
 



Nonresident viruses immediately search for other hosts that can be infected,

infect those targets , and finally transfer contorl to the application program they infected. 

//


非常驻病毒


立即寻找其他主机 , 并且感染这些目标 , 并最终控制他们感染的应用程序。 


Resident viruses do not search for hosts when they are started.

//

常驻病毒感染主机的时候不会去搜索其他主机。 


Instead,a resident virus loads itself into memory on execution and transfers control to the host program.//

相反 , 一个常驻病毒加载到内存中,在执行过程中将控制转移给主机的程序。 


The virus stays active in the background and infects new hosts when those  files are accessed by other programs or the operating system itself.//


该病毒在后台保持活跃性并且当这些文件被其他程序或系统访问时就会去感染其他主机。


 

______________________________________________________________________________ 

2、Resident viruses are sometimes subdivided into a category of fast infectors and a 
    category of slow infectors. //常驻型病毒有时可分为快速感染病毒和慢速感染病毒
   Fast infectors are designed to infect as many files as possible . 
 //快速感染型的病毒被设计去尽可能多的感染文件。

A fast infectors , for instance,can infect every potential host file that is accessed. 
//一个快速的传播者(病毒),例如,可以感染每一个它访问到的潜在的主机文件
 
This poses a special problem when using anti-virus software , since a virus scanner  will access every potential host file on a computer when it performs a system-wide scan. 
//这产生了一个特别的问题当我们使用反病毒软件的时候,因为病毒扫描器在执行扫描时将会访问主机上的每一个潜在的主机文件。 

If the virus scanner fails to notice that such a virus present in memory the virus can 
"piggy-back" on the virus scanner and in this way infect all files that are scanned. 
//如果病毒扫描器未能注意到当前有这样一个病毒存在于内存中,病毒将会依附在扫描器上,并通过这种方式感染所有扫描的文件。

Fast infectors rely on their fast infection rate to spread. 
//快速感染型的病毒依靠于它们快速的传播感染率。
 
The disadvantage of this method is that infecting many files may make detection more
likely,because the virus may slow down a computer or perform many suspicious action that can be noticed by anti-virus software. 
//这种方法的缺点是感染太多的文件可能使病毒更容易被发现,因为病毒可能减慢电脑的速度或表现出许多可疑的行为,从而被反病毒软件发现。

Slow infectors,on the other hand,are designed to infect hosts infrequently .
//另一方面,慢速感染型的病毒被设计成只是偶尔的感染主机。

Some slow infectors ,for instance,only infect files when they are copy. 
//比如说,一些慢速感染的病毒只感染被复制的文件。

Slow infectors are designed to avoid detection by limiting their action:they are less
likely to slow down a computer noticeably and will ,at most ,infrequently trigger 
anti-virus software that detects suspicious behavior by programs. 
//慢速感染的病毒通过限制它们的行为来避免被发现,它们一般不会明显的减慢电脑的速度,至多偶尔触发反病毒软件检测可疑的程序行为。

The slow infectors approach, however, does not seen very successful.

//然而,慢速感染的方法,似乎不是很成功。
 ____________________________________________________________________________

3、Many users install anti-virus software that can detect and eliminate known virus 
      after the computer downloads or runs the executable .
//许多用户安装防病毒软件,可以检测和排除计算机下载的或运行的已知的病毒。

There are two common methods that an anti-virus software application uses to 
detect virus. //杀毒软件有两种常见的检测病毒的方法。

The first,and by far the most common method of virus detection is using a list of virus 
signature definitions.
//第一种,到目前为止最常见的检测病毒的方法是使用病毒签名定义列表。

This works by examining the content of the computer's memory(its RAM and boot 
sectors) and the files store on fixed or removable drives (hard drives ,floppy drives) ,
and comparing those files against a database of known virus "signature".
//这是通过检查计算机内存的内容(RAM和启动扇区)和存储在固定或可移动驱动器(硬盘,软盘驱动器)上的文件,将这些文件和数据库中的已知病毒的签名进行比较。

The disadvantage of this detection method is that users are only protected from viruses that pre-date their last virus definition update. 
//这种检测方法的缺点是用户只能够在他们之前更新的病毒库得到保护。

The second method is to use a heuristic algorithm to find viruses based on common 
behaviors. 
//第二种方法是使用启发式算法来发现病毒根据它们共同的行为。

This method has the ability to detect novel viruses that anti-virus security firms have 
yet to create a signature for.
//这种方法能够检测到反病毒安全公司还没有为其创建签名的新病毒